adsyc-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Adsyc-devel] noncommittal


From: Leslie Roth
Subject: [Adsyc-devel] noncommittal
Date: Sat, 7 Oct 2006 18:45:59 +0200
User-agent: Thunderbird 1.5.0.7 (Windows/20060909)


Most of us buy flood insurance after the first big flood.
By contrast, a template for an archive copy of the same database would use less-expensive SATA drives and prescribe no snapshots.
And outside of the government, encryption is still not mandated.
ISS has one, called Proventa, and Symantec also has one called Critical System Protection. A company must lay out the behavioral expectations for everyone.
But one thing that struck me and several of my colleagues, based on audience reaction to the various sessions, was just how early we are yet in the lifecycle of virtualization technologies. Might happen next year; might not. All Internet browsers are full of holes.
So the big question is, Where are those CPUs, and exactly how much smoke are we talking about?
A company must lay out the behavioral expectations for everyone.
I wanted to know if anything similar was planned for storage.
Better to wait until the big platform boys get their acts together, and then take stock. Our enterprise customers are more adventurous, but so far, only host intrusion is showing enough progress that we might start recommending it as early as next year for full implementations. Creating open source storage software is difficult today because doing so requires access to a broad range of storage technologies, many of which are proprietary and undocumented. The only thing worse to contemplate on this issue is how much longer it will truly take before anybody does anything about it. I responded that they all are pretty bad. The definition of pretexting is getting private information about an individual under false pretenses.
Redundancies are inevitable, and no one can plan their needs as far ahead as budget cycles demand. I do it for a living, and rarely do I have to wait more than a few minutes for complete network access.
After a decade of training, Amazon got really good at pumping iron, and now you can hire its muscle to do some heavy lifting for you. A company must lay out the behavioral expectations for everyone. But one thing that struck me and several of my colleagues, based on audience reaction to the various sessions, was just how early we are yet in the lifecycle of virtualization technologies. Anyone can repackage internal services and try to sell them.
I do it for a living, and rarely do I have to wait more than a few minutes for complete network access. So far, CEO and new board chair Mark Hurd has managed to keep his scalp attached.
This technology is pretty new, but there are bigger vendors working on it.
Anyone can repackage internal services and try to sell them.
Both improve resource utilization and make IT management easier. While there are plenty of server virtualization solutions and tools that support or are based on open source, there has been comparatively little movement on open source storage virtualization. I wanted to know if anything similar was planned for storage. My apologies if I treated the fairer sex unfairly. Last week, a class of mine asked which vendor had the best security.
Anyone for whom the price is right will be able to outsource fulfillment to Amazon.
What does eventually get passed will not work.
Might happen next year; might not. ISS has one, called Proventa, and Symantec also has one called Critical System Protection.
While there are plenty of server virtualization solutions and tools that support or are based on open source, there has been comparatively little movement on open source storage virtualization.
While there are plenty of server virtualization solutions and tools that support or are based on open source, there has been comparatively little movement on open source storage virtualization.


reply via email to

[Prev in Thread] Current Thread [Next in Thread]